SOF Day 1 Review

SOF Day 1 Review

Professional Development

12 Qs

quiz-placeholder

Similar activities

just simple!

just simple!

KG - Professional Development

14 Qs

PowerShell and Windows Server

PowerShell and Windows Server

12th Grade - Professional Development

10 Qs

Arrays & Strings using C

Arrays & Strings using C

Professional Development

15 Qs

Parts and function of a Mouse

Parts and function of a Mouse

Professional Development

11 Qs

3°TEC_PROGRAMAÇÃO MOBILE - AVALIAÇÃO 2º TRIMESTRE AV3

3°TEC_PROGRAMAÇÃO MOBILE - AVALIAÇÃO 2º TRIMESTRE AV3

Professional Development

16 Qs

PreTrainingCollectionsArrays

PreTrainingCollectionsArrays

Professional Development

9 Qs

Security+ Study Guide-04 Securing Your Network

Security+ Study Guide-04 Securing Your Network

Professional Development

15 Qs

Marvel Future Fight

Marvel Future Fight

KG - Professional Development

11 Qs

SOF Day 1 Review

SOF Day 1 Review

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Justin Bauguess

Used 24+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are some of the costs associated with a data breach? (Select more than one answer.)

Fines

Re-Training Employees

Reputation Damage

Nothing - Data Breaches don't cost anything

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are some signs a security operations organization is at ServiceNow's "Maturity Level 2"? (Multiple answers)

Automated querying of internal and supplier environments

Prioritization by impact

KPIs, Reporting, and SLAs

Noise Reduction

Easily handle common attacks to improve response closure

Answer explanation

Automated querying of internal and supplier environments is part of level 5 Easily handle common attacks to improve response closure is part of level 4.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: It is better to add roles directly to a user rather than adding roles to a group and then users to the group.

True

False

Answer explanation

Adding roles to the group then users to that group prevents a user from keeping a role they should not have.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the scope prefix for Security Incident?

sn_sec_si

sn_sec_cmn

sn_vul

sn_si

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the scope prefix for Vulnerability Response?

sn_sec_vul

sn_vul

sn_si

sn_sec_cmn

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which are features from Security Support Common (but can be used for other purposes)?

There are multiple answers.

Enrichment Data Mapping

Email Parsing

Escalations

Workflow Triggers

Filter Groups

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False. Vulnerable Items can only be part of one Remediation Task (Vulnerability Group).

True

False

Answer explanation

Vulnerable Items and Remediation Tasks (Vulnerability Groups) are related in the sn_vul_m2m_vul_group_item table.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?